Chapter 6-10 Networking Exam Answers

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which layer in the TCP/IP model is used for formatting, compressing, and encrypting data?

application

What is the complete range of TCP and UDP well-known ports?

0 to 1023

A PC is downloading a large file from a sever. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the server send before it requires an acknowledgement from the PC?

10 segments

How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?

1022

If a network device has a mask of /28, how many IP addresses are available for hosts on this network?

14

What is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64?

2001:DB8:BC15:A

A DHCP server is used to assign IP addresses dynamically to the hosts on a network. The address pool is configured with 192.168.10.0/24. There are 3 printers on this network that need to use reserved static IP addresses from the pool. How many IP addresses in the pool are left to be assigned to other hosts?

251

What subnet mask is represented by the slash notation /20?

255.255.240.0

Which subnet mask would be used if 5 host bits are available?

255.255.255.224

What is an advantage for small organizations of adopting IMAP instead of POP?

Messages are kept in the mail servers until they are manually deleted from the email client.

What IPv4 header field identifies the upper layer protocol carried in the packet?

Protocol

What part of the URL, http://www.cisco.com/index.html, represents the top-level DNS domain?

.com

How many bits are in an IPv4 address?

32

Which of these addresses is the shortest abbreviation for the IP address: 3FFE: 1044: 0000: 0000: 00AB: 0000: 0000: 0057?

3FFE : 1044 : 0 : 0 : AB :: 57

A network administrator is variably subnetting a network. The smallest subnet has amask of 255.255.255.248. How many usable host addresses will this subnet provide?

6

What is an example of network communication that uses the client server model?

A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser.

Which flag in the TCP header is used in response to a received FIN in order to terminate connectivity between two network devices?

ACK

What do the client/server and peer-to-peer network models have in common?

Both models support devices in server and client roles.

What is true about the Server Message Block protocol?

Clients establish a long term connection to servers

Which application layer protocol uses message types such as GET, PUT, and POST?

HTTP

What field content is used by ICMPv6 to determine that a packet has expired?

Hop Limit field

Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host?

ICMPv6

When retrieving email messages, which protocol allows for easy centralized storage and backup of emails that would be desirable for a small- to medium-sized business?

IMAP

What is indicated by a successful ping to the ::1 IPv6 address?

IP is properly installed on the host

Which statement describes a hardware feature of a Cisco 1941 router that has the default hardware configuration?

It has two types of ports that can be used to access the console.

What does a client do when it has UDP datagarms to send?

It just sends the datagrams

Following default settings, what is the next step in the router boot sequence after the IOS loads form flash?

Locate and load the startup-config file from NVRAM.

Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?

SMB

Which characteristic describes an IPv6 enhancement over IPv4?

The IPv6 header is simpler than the IPv4 header is, which improves packet handling.

What happens if the first packet of a TFTP transfer is lost?

The TFTP application will retry the request if a reply is not received

Which statement is true about FTP?

The client can download data form or upload data to the server

A router boots and enters setup mode. what is the reason for this?

The configuration file is missing from the NVRAM.

A host device is receiving live streaming video. How does the device account for video data that is lost during transmission?

The device will continue receiving the streaming video, but there may be a momentary disruption

What happens if part of an FTP message is not delivered to the destination?

The part of the FTP message that was lost is re-sent.

What does TCP do if sending source detects network congestion on the path to the destination?

The source will decrease the amount of data that it sends before it must receive acknowledgements from the destination

What is a characteristic of a TCP server process?

There can be many ports open simultaneously on a server. one for each active server application.

Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly?

Time-to-live

What is a characteristic of UDP?

UDP reassembles the received datagrams in the order they were received

Which phrase describes an FTP daemon?

a program that is running on an FTP server

Why does HTTP use TCP as a transport layer protocol?

because HTTP requires reliable delivery

What type of information is included in the transport header?

destination and source port numbers

A message is sent to all hosts on a remote network. Which type of message is it?

directed broadcast

What type of route is indicated by the code C in an IPv4 routing table on a Cisco router?

directy connected route

What is one advantage that the IPv6 simplified header offers over IPv4?

efficient packet handling

what does the IP address 172.17.4.250/24 represent?

host address

What type of address is automatically assigned to an interface when IPv6 is enabled on the interface?

link-local

A host device needs to send a large video file across the network while providing data communication to other users. which feature will allow different communication streams to occur at the same time, without having a single data stream using all available bandwidth?

multiplexing

Two students are working on network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to a USB drive. Which networking model is being used?

peer-to-peer

A network administrator needs to monitor the traffic to and from servers in a data center. Which features of an IP addressing scheme should be applied to these devices?

predictable static IP addresses for easier identification.

What kind of port must be requested from IANA in order to be used with a specific application?

registered port

What routing table entry has a next hop address associated with a destination network?

remote routes

What information is used by TCP to reassemble and reorder received segments?

sequence numbers

An administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisement messages, but also to obtain the DNS server address form a DCHPv6 server. Which address assignment method should be configured?

stateless DHCPv6

Which characteristics of the network layer in the OSI model allows packets for multiple types of communications among many hosts?

the ability to operate without regard to the data that is carried in each packet.

Which factor determines TCP window size?

the amount of data the destination can process at one time.

What is a socket?

the combination of a source IP address and port number or a destination IP address and port number.

During a TCP session, a destination device sends an acknowledgement number to the source device. What does the acknowledgement number represent?

the next byte that the destination expects to receive.

What is a result of connecting two or more switches together?

the size of the broadcast domain is increased.

How many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks?

three

What is the purpose of the startup configuration file on a Cisco router?

to contain the commands that are used to initially configure a router on startup.

What is the purpose of the subnet mask in conjunction with an IP address?

to determine the subnet to which the host belonngs

What is the purpose of ICMP messages?

to provide feedback of IP packet transmissions

When is UDP preferred to TCP?

when an application can tolerate some loss of data during transmission.

A user is executing a tracert to a remote device. at which point would a router, which is in the path to the destination device, stop forwarding the packet?

when the value in the TTL field reaches zero


Ensembles d'études connexes

The Study of Minorities (chap 1) #36-70

View Set

Maryland Property & Casualty Insurance Practice Questions

View Set

Chapter 9 Nervous System Disease and Conditions

View Set

Chapter 32: Drug therapy to decrease Histamine Effects and Allergic reactions

View Set

Chapter 1 - Insurance Regulations

View Set